Completed
Push — master ( d062c8...d1cb83 )
by Blizzz
14:05
created
settings/Controller/CheckSetupController.php 1 patch
Spacing   +27 added lines, -27 removed lines patch added patch discarded remove patch
@@ -136,7 +136,7 @@  discard block
 block discarded – undo
136 136
 						'www.edri.org',
137 137
 			];
138 138
 
139
-		foreach($siteArray as $site) {
139
+		foreach ($siteArray as $site) {
140 140
 			if ($this->isSiteReachable($site)) {
141 141
 				return true;
142 142
 			}
@@ -149,8 +149,8 @@  discard block
 block discarded – undo
149 149
 	* @return bool
150 150
 	*/
151 151
 	private function isSiteReachable($sitename) {
152
-		$httpSiteName = 'http://' . $sitename . '/';
153
-		$httpsSiteName = 'https://' . $sitename . '/';
152
+		$httpSiteName = 'http://'.$sitename.'/';
153
+		$httpsSiteName = 'https://'.$sitename.'/';
154 154
 
155 155
 		try {
156 156
 			$client = $this->clientService->newClient();
@@ -207,40 +207,40 @@  discard block
 block discarded – undo
207 207
 		// Don't run check when:
208 208
 		// 1. Server has `has_internet_connection` set to false
209 209
 		// 2. AppStore AND S2S is disabled
210
-		if(!$this->config->getSystemValue('has_internet_connection', true)) {
210
+		if (!$this->config->getSystemValue('has_internet_connection', true)) {
211 211
 			return '';
212 212
 		}
213
-		if(!$this->config->getSystemValue('appstoreenabled', true)
213
+		if (!$this->config->getSystemValue('appstoreenabled', true)
214 214
 			&& $this->config->getAppValue('files_sharing', 'outgoing_server2server_share_enabled', 'yes') === 'no'
215 215
 			&& $this->config->getAppValue('files_sharing', 'incoming_server2server_share_enabled', 'yes') === 'no') {
216 216
 			return '';
217 217
 		}
218 218
 
219 219
 		$versionString = $this->getCurlVersion();
220
-		if(isset($versionString['ssl_version'])) {
220
+		if (isset($versionString['ssl_version'])) {
221 221
 			$versionString = $versionString['ssl_version'];
222 222
 		} else {
223 223
 			return '';
224 224
 		}
225 225
 
226
-		$features = (string)$this->l10n->t('installing and updating apps via the app store or Federated Cloud Sharing');
227
-		if(!$this->config->getSystemValue('appstoreenabled', true)) {
228
-			$features = (string)$this->l10n->t('Federated Cloud Sharing');
226
+		$features = (string) $this->l10n->t('installing and updating apps via the app store or Federated Cloud Sharing');
227
+		if (!$this->config->getSystemValue('appstoreenabled', true)) {
228
+			$features = (string) $this->l10n->t('Federated Cloud Sharing');
229 229
 		}
230 230
 
231 231
 		// Check if at least OpenSSL after 1.01d or 1.0.2b
232
-		if(strpos($versionString, 'OpenSSL/') === 0) {
232
+		if (strpos($versionString, 'OpenSSL/') === 0) {
233 233
 			$majorVersion = substr($versionString, 8, 5);
234 234
 			$patchRelease = substr($versionString, 13, 6);
235 235
 
236
-			if(($majorVersion === '1.0.1' && ord($patchRelease) < ord('d')) ||
236
+			if (($majorVersion === '1.0.1' && ord($patchRelease) < ord('d')) ||
237 237
 				($majorVersion === '1.0.2' && ord($patchRelease) < ord('b'))) {
238 238
 				return (string) $this->l10n->t('cURL is using an outdated %s version (%s). Please update your operating system or features such as %s will not work reliably.', ['OpenSSL', $versionString, $features]);
239 239
 			}
240 240
 		}
241 241
 
242 242
 		// Check if NSS and perform heuristic check
243
-		if(strpos($versionString, 'NSS/') === 0) {
243
+		if (strpos($versionString, 'NSS/') === 0) {
244 244
 			try {
245 245
 				$firstClient = $this->clientService->newClient();
246 246
 				$firstClient->get('https://nextcloud.com/');
@@ -248,7 +248,7 @@  discard block
 block discarded – undo
248 248
 				$secondClient = $this->clientService->newClient();
249 249
 				$secondClient->get('https://nextcloud.com/');
250 250
 			} catch (ClientException $e) {
251
-				if($e->getResponse()->getStatusCode() === 400) {
251
+				if ($e->getResponse()->getStatusCode() === 400) {
252 252
 					return (string) $this->l10n->t('cURL is using an outdated %s version (%s). Please update your operating system or features such as %s will not work reliably.', ['NSS', $versionString, $features]);
253 253
 				}
254 254
 			}
@@ -343,13 +343,13 @@  discard block
 block discarded – undo
343 343
 	 * @return DataResponse
344 344
 	 */
345 345
 	public function getFailedIntegrityCheckFiles() {
346
-		if(!$this->checker->isCodeCheckEnforced()) {
346
+		if (!$this->checker->isCodeCheckEnforced()) {
347 347
 			return new DataDisplayResponse('Integrity checker has been disabled. Integrity cannot be verified.');
348 348
 		}
349 349
 
350 350
 		$completeResults = $this->checker->getResults();
351 351
 
352
-		if(!empty($completeResults)) {
352
+		if (!empty($completeResults)) {
353 353
 			$formattedTextResponse = 'Technical information
354 354
 =====================
355 355
 The following list covers which files have failed the integrity check. Please read
@@ -359,12 +359,12 @@  discard block
 block discarded – undo
359 359
 Results
360 360
 =======
361 361
 ';
362
-			foreach($completeResults as $context => $contextResult) {
362
+			foreach ($completeResults as $context => $contextResult) {
363 363
 				$formattedTextResponse .= "- $context\n";
364 364
 
365
-				foreach($contextResult as $category => $result) {
365
+				foreach ($contextResult as $category => $result) {
366 366
 					$formattedTextResponse .= "\t- $category\n";
367
-					if($category !== 'EXCEPTION') {
367
+					if ($category !== 'EXCEPTION') {
368 368
 						foreach ($result as $key => $results) {
369 369
 							$formattedTextResponse .= "\t\t- $key\n";
370 370
 						}
@@ -405,27 +405,27 @@  discard block
 block discarded – undo
405 405
 	protected function isOpcacheProperlySetup() {
406 406
 		$iniWrapper = new IniGetWrapper();
407 407
 
408
-		if(!$iniWrapper->getBool('opcache.enable')) {
408
+		if (!$iniWrapper->getBool('opcache.enable')) {
409 409
 			return false;
410 410
 		}
411 411
 
412
-		if(!$iniWrapper->getBool('opcache.save_comments')) {
412
+		if (!$iniWrapper->getBool('opcache.save_comments')) {
413 413
 			return false;
414 414
 		}
415 415
 
416
-		if(!$iniWrapper->getBool('opcache.enable_cli')) {
416
+		if (!$iniWrapper->getBool('opcache.enable_cli')) {
417 417
 			return false;
418 418
 		}
419 419
 
420
-		if($iniWrapper->getNumeric('opcache.max_accelerated_files') < 10000) {
420
+		if ($iniWrapper->getNumeric('opcache.max_accelerated_files') < 10000) {
421 421
 			return false;
422 422
 		}
423 423
 
424
-		if($iniWrapper->getNumeric('opcache.memory_consumption') < 128) {
424
+		if ($iniWrapper->getNumeric('opcache.memory_consumption') < 128) {
425 425
 			return false;
426 426
 		}
427 427
 
428
-		if($iniWrapper->getNumeric('opcache.interned_strings_buffer') < 8) {
428
+		if ($iniWrapper->getNumeric('opcache.interned_strings_buffer') < 8) {
429 429
 			return false;
430 430
 		}
431 431
 
@@ -501,7 +501,7 @@  discard block
 block discarded – undo
501 501
 	protected function getSuggestedOverwriteCliURL(): string {
502 502
 		$suggestedOverwriteCliUrl = '';
503 503
 		if ($this->config->getSystemValue('overwrite.cli.url', '') === '') {
504
-			$suggestedOverwriteCliUrl = $this->request->getServerProtocol() . '://' . $this->request->getInsecureServerHost() . \OC::$WEBROOT;
504
+			$suggestedOverwriteCliUrl = $this->request->getServerProtocol().'://'.$this->request->getInsecureServerHost().\OC::$WEBROOT;
505 505
 			if (!$this->config->getSystemValue('config_is_read_only', false)) {
506 506
 				// Set the overwrite URL when it was not set yet.
507 507
 				$this->config->setSystemValue('overwrite.cli.url', $suggestedOverwriteCliUrl);
@@ -516,7 +516,7 @@  discard block
 block discarded – undo
516 516
 		return [
517 517
 			'diffInSeconds' => time() - $lastCronRun,
518 518
 			'relativeTime' => $this->dateTimeFormatter->formatTimeSpan($lastCronRun),
519
-			'backgroundJobsUrl' => $this->urlGenerator->linkToRoute('settings.AdminSettings.index', ['section' => 'server']) . '#backgroundjobs',
519
+			'backgroundJobsUrl' => $this->urlGenerator->linkToRoute('settings.AdminSettings.index', ['section' => 'server']).'#backgroundjobs',
520 520
 		];
521 521
 	}
522 522
 
@@ -574,7 +574,7 @@  discard block
 block discarded – undo
574 574
 
575 575
 		foreach ($appsDir as $fileInfo) {
576 576
 			if ($fileInfo->isDir() && !$fileInfo->isDot()) {
577
-				$absAppPath = $appsPath . DIRECTORY_SEPARATOR . $fileInfo->getFilename();
577
+				$absAppPath = $appsPath.DIRECTORY_SEPARATOR.$fileInfo->getFilename();
578 578
 				$appDirUser = fileowner($absAppPath);
579 579
 				if ($appDirUser !== $currentUser) {
580 580
 					$appDirsWithDifferentOwner[] = $absAppPath;
Please login to merge, or discard this patch.